2021-07-08 14:46:47 +02:00
|
|
|
from typing import List, Tuple
|
2016-07-30 00:33:29 +02:00
|
|
|
|
2021-07-08 14:46:47 +02:00
|
|
|
from django.conf import settings
|
2022-01-04 21:59:51 +01:00
|
|
|
from django.core.exceptions import ValidationError
|
2017-11-16 00:55:49 +01:00
|
|
|
from django.db import models
|
|
|
|
|
2019-01-31 00:39:02 +01:00
|
|
|
from analytics.models import BaseCount
|
2021-07-08 14:46:47 +02:00
|
|
|
from zerver.lib.rate_limiter import RateLimitedObject
|
|
|
|
from zerver.lib.rate_limiter import rules as rate_limiter_rules
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.models import AbstractPushDeviceToken, AbstractRealmAuditLog
|
|
|
|
|
2013-10-17 16:33:04 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
def get_remote_server_by_uuid(uuid: str) -> "RemoteZulipServer":
|
2022-01-04 21:59:51 +01:00
|
|
|
try:
|
|
|
|
return RemoteZulipServer.objects.get(uuid=uuid)
|
|
|
|
except ValidationError:
|
2023-02-04 02:07:20 +01:00
|
|
|
raise RemoteZulipServer.DoesNotExist
|
2016-10-27 23:55:31 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-10-27 23:55:31 +02:00
|
|
|
class RemoteZulipServer(models.Model):
|
2021-12-01 17:31:08 +01:00
|
|
|
"""Each object corresponds to a single remote Zulip server that is
|
|
|
|
registered for the Mobile Push Notifications Service via
|
|
|
|
`manage.py register_server`.
|
|
|
|
"""
|
|
|
|
|
2018-05-04 01:40:46 +02:00
|
|
|
UUID_LENGTH = 36
|
|
|
|
API_KEY_LENGTH = 64
|
|
|
|
HOSTNAME_MAX_LENGTH = 128
|
2016-10-27 23:55:31 +02:00
|
|
|
|
2021-12-01 17:31:08 +01:00
|
|
|
# The unique UUID (`zulip_org_id`) and API key (`zulip_org_key`)
|
|
|
|
# for this remote server registration.
|
2022-08-15 19:10:58 +02:00
|
|
|
uuid = models.UUIDField(unique=True)
|
|
|
|
api_key = models.CharField(max_length=API_KEY_LENGTH)
|
2018-05-04 01:40:46 +02:00
|
|
|
|
2021-12-01 17:31:08 +01:00
|
|
|
# The hostname and contact details are not verified/trusted. Thus,
|
|
|
|
# they primarily exist so that we can communicate with the
|
|
|
|
# maintainer of a server about abuse problems.
|
2022-08-15 19:10:58 +02:00
|
|
|
hostname = models.CharField(max_length=HOSTNAME_MAX_LENGTH)
|
|
|
|
contact_email = models.EmailField(blank=True, null=False)
|
|
|
|
last_updated = models.DateTimeField("last updated", auto_now=True)
|
2016-10-27 23:55:31 +02:00
|
|
|
|
2021-12-15 18:53:58 +01:00
|
|
|
# Whether the server registration has been deactivated.
|
2022-08-15 19:10:58 +02:00
|
|
|
deactivated = models.BooleanField(default=False)
|
2021-12-15 18:53:58 +01:00
|
|
|
|
2021-12-01 17:31:08 +01:00
|
|
|
# Plan types for self-hosted customers
|
|
|
|
PLAN_TYPE_SELF_HOSTED = 1
|
|
|
|
PLAN_TYPE_STANDARD = 102
|
|
|
|
|
|
|
|
# The current billing plan for the remote server, similar to Realm.plan_type.
|
2022-08-15 19:10:58 +02:00
|
|
|
plan_type = models.PositiveSmallIntegerField(default=PLAN_TYPE_SELF_HOSTED)
|
2021-12-01 17:31:08 +01:00
|
|
|
|
2018-03-23 18:19:33 +01:00
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.hostname} {str(self.uuid)[0:12]}"
|
2018-03-23 18:19:33 +01:00
|
|
|
|
2023-06-20 22:52:31 +02:00
|
|
|
def format_requester_for_logs(self) -> str:
|
2021-12-22 14:37:12 +01:00
|
|
|
return "zulip-server:" + str(self.uuid)
|
2020-03-09 12:21:46 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-01-13 19:37:13 +01:00
|
|
|
class RemotePushDeviceToken(AbstractPushDeviceToken):
|
2021-12-01 17:31:08 +01:00
|
|
|
"""Like PushDeviceToken, but for a device connected to a remote server."""
|
|
|
|
|
2022-08-15 19:10:58 +02:00
|
|
|
server = models.ForeignKey(RemoteZulipServer, on_delete=models.CASCADE)
|
2022-02-08 00:13:33 +01:00
|
|
|
# The user id on the remote server for this device
|
2022-08-15 19:10:58 +02:00
|
|
|
user_id = models.BigIntegerField(null=True)
|
|
|
|
user_uuid = models.UUIDField(null=True)
|
2017-10-19 06:21:27 +02:00
|
|
|
|
2017-11-05 11:33:09 +01:00
|
|
|
class Meta:
|
2022-02-23 20:25:30 +01:00
|
|
|
unique_together = [
|
|
|
|
# These indexes rely on the property that in Postgres,
|
|
|
|
# NULL != NULL in the context of unique indexes, so multiple
|
|
|
|
# rows with the same values in these columns can exist
|
|
|
|
# if one of them is NULL.
|
|
|
|
("server", "user_id", "kind", "token"),
|
|
|
|
("server", "user_uuid", "kind", "token"),
|
|
|
|
]
|
2018-01-13 19:37:13 +01:00
|
|
|
|
2018-03-23 18:19:33 +01:00
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.server!r} {self.user_id}"
|
2019-01-31 00:39:02 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-12-01 17:31:08 +01:00
|
|
|
class RemoteZulipServerAuditLog(AbstractRealmAuditLog):
|
|
|
|
"""Audit data associated with a remote Zulip server (not specific to a
|
|
|
|
realm). Used primarily for tracking registration and billing
|
|
|
|
changes for self-hosted customers.
|
|
|
|
|
|
|
|
In contrast with RemoteRealmAuditLog, which has a copy of data
|
|
|
|
that is generated on the client Zulip server, this table is the
|
|
|
|
authoritative storage location for the server's history.
|
|
|
|
"""
|
|
|
|
|
2022-08-15 19:10:58 +02:00
|
|
|
server = models.ForeignKey(RemoteZulipServer, on_delete=models.CASCADE)
|
2021-12-01 17:31:08 +01:00
|
|
|
|
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.server!r} {self.event_type} {self.event_time} {self.id}"
|
2021-12-01 17:31:08 +01:00
|
|
|
|
|
|
|
|
2019-10-03 02:01:36 +02:00
|
|
|
class RemoteRealmAuditLog(AbstractRealmAuditLog):
|
|
|
|
"""Synced audit data from a remote Zulip server, used primarily for
|
|
|
|
billing. See RealmAuditLog and AbstractRealmAuditLog for details.
|
|
|
|
"""
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2022-08-15 19:10:58 +02:00
|
|
|
server = models.ForeignKey(RemoteZulipServer, on_delete=models.CASCADE)
|
2023-09-13 18:29:06 +02:00
|
|
|
realm_id = models.IntegerField()
|
2019-10-03 02:01:36 +02:00
|
|
|
# The remote_id field lets us deduplicate data from the remote server
|
2023-09-13 18:29:06 +02:00
|
|
|
remote_id = models.IntegerField()
|
2019-10-03 02:01:36 +02:00
|
|
|
|
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.server!r} {self.event_type} {self.event_time} {self.id}"
|
2019-10-03 02:01:36 +02:00
|
|
|
|
2023-09-13 18:29:06 +02:00
|
|
|
class Meta:
|
|
|
|
constraints = [
|
|
|
|
models.UniqueConstraint(
|
|
|
|
fields=["server", "remote_id"],
|
|
|
|
name="zilencer_remoterealmauditlog_server_remote",
|
|
|
|
),
|
|
|
|
]
|
|
|
|
indexes = [
|
|
|
|
models.Index(
|
|
|
|
fields=["server", "realm_id", "remote_id"],
|
|
|
|
name="zilencer_remoterealmauditlog_server_realm_remote",
|
|
|
|
),
|
|
|
|
]
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2019-01-31 00:39:02 +01:00
|
|
|
class RemoteInstallationCount(BaseCount):
|
2022-08-15 19:10:58 +02:00
|
|
|
server = models.ForeignKey(RemoteZulipServer, on_delete=models.CASCADE)
|
2019-01-31 00:39:02 +01:00
|
|
|
# The remote_id field lets us deduplicate data from the remote server
|
2022-08-15 19:10:58 +02:00
|
|
|
remote_id = models.IntegerField(db_index=True)
|
2019-01-31 00:39:02 +01:00
|
|
|
|
|
|
|
class Meta:
|
|
|
|
unique_together = ("server", "property", "subgroup", "end_time")
|
2023-06-11 21:22:36 +02:00
|
|
|
indexes = [
|
|
|
|
models.Index(
|
|
|
|
fields=["server", "remote_id"],
|
|
|
|
name="zilencer_remoteinstallat_server_id_remote_id_f72e4c30_idx",
|
|
|
|
),
|
2019-04-23 22:19:16 +02:00
|
|
|
]
|
2019-01-31 00:39:02 +01:00
|
|
|
|
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.property} {self.subgroup} {self.value}"
|
2019-01-31 00:39:02 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2019-01-31 00:39:02 +01:00
|
|
|
# We can't subclass RealmCount because we only have a realm_id here, not a foreign key.
|
|
|
|
class RemoteRealmCount(BaseCount):
|
2022-08-15 19:10:58 +02:00
|
|
|
server = models.ForeignKey(RemoteZulipServer, on_delete=models.CASCADE)
|
2023-09-13 18:29:06 +02:00
|
|
|
realm_id = models.IntegerField()
|
2019-01-31 00:39:02 +01:00
|
|
|
# The remote_id field lets us deduplicate data from the remote server
|
2023-09-13 18:29:06 +02:00
|
|
|
remote_id = models.IntegerField()
|
2019-01-31 00:39:02 +01:00
|
|
|
|
|
|
|
class Meta:
|
|
|
|
unique_together = ("server", "realm_id", "property", "subgroup", "end_time")
|
2023-06-11 21:22:36 +02:00
|
|
|
indexes = [
|
|
|
|
models.Index(
|
|
|
|
fields=["property", "end_time"],
|
|
|
|
name="zilencer_remoterealmcount_property_end_time_506a0b38_idx",
|
|
|
|
),
|
|
|
|
models.Index(
|
|
|
|
fields=["server", "remote_id"],
|
|
|
|
name="zilencer_remoterealmcount_server_id_remote_id_de1573d8_idx",
|
|
|
|
),
|
2019-04-23 22:19:16 +02:00
|
|
|
]
|
2019-01-31 00:39:02 +01:00
|
|
|
|
|
|
|
def __str__(self) -> str:
|
2023-03-08 22:18:59 +01:00
|
|
|
return f"{self.server!r} {self.realm_id} {self.property} {self.subgroup} {self.value}"
|
2021-07-08 14:46:47 +02:00
|
|
|
|
|
|
|
|
|
|
|
class RateLimitedRemoteZulipServer(RateLimitedObject):
|
|
|
|
def __init__(
|
|
|
|
self, remote_server: RemoteZulipServer, domain: str = "api_by_remote_server"
|
|
|
|
) -> None:
|
|
|
|
# Remote servers can only make API requests regarding push notifications
|
2022-02-08 00:13:33 +01:00
|
|
|
# which requires ZILENCER_ENABLED and of course can't happen on API endpoints
|
2021-07-08 14:46:47 +02:00
|
|
|
# inside Tornado.
|
|
|
|
assert not settings.RUNNING_INSIDE_TORNADO
|
|
|
|
assert settings.ZILENCER_ENABLED
|
|
|
|
|
2021-12-22 14:37:12 +01:00
|
|
|
self.uuid = str(remote_server.uuid)
|
2021-07-08 14:46:47 +02:00
|
|
|
self.domain = domain
|
|
|
|
super().__init__()
|
|
|
|
|
|
|
|
def key(self) -> str:
|
|
|
|
return f"{type(self).__name__}:<{self.uuid}>:{self.domain}"
|
|
|
|
|
|
|
|
def rules(self) -> List[Tuple[int, int]]:
|
|
|
|
return rate_limiter_rules[self.domain]
|